BSides Sponsor

Feb 02 @ 08:00 AM

Fundamentals of Routing and Switching for Blue and Red Team

Feb 02 @ 08:00 AM

Instructor Bio:
Paul Coggin is a Cyber Security Research Scientist for a large financial institution. His expertise includes tactical, service provider, and ICS\SCADA network infrastructure attacks, and defenses, as well as large complex network design and implementation. His experience includes leading network architecture reviews, vulnerability analysis, and penetration testing engagements for critical infrastructure and tactical networks. Pauls’ experience includes teaching networking, hacking and forensics courses Internationally. He has a BS in Math\Computer Science, MS in Information Assurance and Security and a MS in Computer Information Systems. In addition he holds a number of network and security certifications.

Course Abstract:
In this intense 2-day class, students will learn the fundamentals of routing and switching from a blue and red team perspective. Using hands-on labs students will receive practical experience with routing and switching technologies with a detailed discussion on how to attack and defend the network infrastructure. Students will leave the class with a good understanding of how to configure and operate routing and switching protocols as well as how to attack and defend the control, management and data planes in their organization networks.
Student software requirement for labs: CCNA Routing and Switching 200-125 Network Simulator, Download Version, Orderable at http://www.ciscopress.com or www.amazon.com.
http://www.ciscopress.com/store/ccna-routing-and-switching-200-125-network-simulator-9780134575742

Intro to ICS Network Security Monitoring

Feb 02 @ 08:00 AM

Dennis Murphy teaching on Designing, installing and maintaining process automation networks is where I started my career 25 years ago. Most of my experience with SCADA systems was integrating data between the IT and OT networks. In 2005, I realized how security was more of an afterthought in my work and I shifted my focus to securing ICS networks. Now I am turning into a network security monitoring (NSM) professional and using this technology to help ICS engineers understand the impacts their design decisions have on the security of control system networks.
I focus on providing practical solutions to meet national critical infrastructure cyber security requirements. My main interest is in bridging the gap between the information technology (IT) security requirements and operational technology (OT) security requirements. Those requirements are not synchronized and causes much confusion and heartache in the industry.

Mobile Security Toolkit – Ethical Hacking Workshop

Feb 02 @ 08:30 AM

C-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform which comes equipped with a customized distro of Kali loaded onto a portable Raspberry Pi-based touchscreen device.
EC-Council rolled out the STORM as a mobile tool to enhance our certification course offerings by giving online asynchronous students a mobile training option. In this option, the video lectures are loaded directly onto the STORM.